Towards the unmanned aerial vehicles (UAVs): A comprehensive review SAH Mohsan, MA Khan, F Noor, I Ullah, MH Alsharif Drones 6 (6), 147, 2022 | 379 | 2022 |
Swarm of UAVs for network management in 6G: A technical review MA Khan, N Kumar, SAH Mohsan, WU Khan, MM Nasralla, MH Alsharif, ... IEEE Transactions on Network and Service Management, 2023 | 177 | 2023 |
A review on communications perspective of flying ad-hoc networks: key enabling wireless technologies, applications, challenges and open research topics F Noor, MA Khan, A Al-Zahrani, I Ullah, KA Al-Dhlan Drones 4 (4), 65, 2020 | 96 | 2020 |
An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network MA Khan, I Ullah, S Nisar, F Noor, IM Qureshi, FU Khanzada, NU Amin IEEE Access 8, 36807-36828, 2020 | 85 | 2020 |
A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems MA Khan, I Ullah, A Alkhalifah, SU Rehman, JA Shah, MI Uddin, ... IEEE Transactions on Industrial Informatics 18 (5), 3416-3425, 2022 | 84 | 2022 |
An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks MA Khan, I Ullah, N Kumar, OS Oubbati, IM Qureshi, F Noor, ... IEEE Transactions on Vehicular Technology 70 (5), 4839-4851, 2021 | 62 | 2021 |
A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for Internet of Things enabled smart grid S Hussain, I Ullah, H Khattak, M Adnan, S Kumari, SS Ullah, MA Khan, ... IEEE Access 8, 93230-93248, 2020 | 58 | 2020 |
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT) S Hussain, I Ullah, H Khattak, MA Khan, CM Chen, S Kumari Journal of Information Security and Applications 58, 102625, 2021 | 49 | 2021 |
An efficient and provably secure certificateless blind signature scheme for flying ad-hoc network based on multi-access edge computing MA Khan, IM Qureshi, I Ullah, S Khan, F Khanzada, F Noor Electronics 9 (1), 30, 2019 | 47 | 2019 |
A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things SS Ullah, I Ullah, H Khattak, MA Khan, M Adnan, S Hussain, NU Amin, ... IEEE Access 8, 98910-98928, 2020 | 46 | 2020 |
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity‐Based Generalized Signcryption MA Khan, I Ullah, S Nisar, F Noor, IM Qureshi, F Khanzada, H Khattak, ... Mobile Information Systems 2020 (1), 8861947, 2020 | 46 | 2020 |
An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) system I Ullah, NU Amin, MA Khan, H Khattak, S Kumari Journal of Medical Systems 45 (1), 4, 2021 | 45 | 2021 |
Securing internet of drones with identity-based proxy signcryption MA Khan, H Shah, SU Rehman, N Kumar, R Ghazali, D Shehzad, I Ullah IEEE Access 9, 89133-89142, 2021 | 43 | 2021 |
An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles I Ullah, MA Khan, F Khan, MA Jan, R Srinivasan, S Mastorakis, S Hussain, ... IEEE Internet of Things Journal 9 (4), 2688-2697, 2022 | 42 | 2022 |
A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve A ur Rahman, I Ullah, M Naeem, R Anwar, H Khattak, S Ullah International Journal of Advanced Computer Science and Applications 9 (5), 2018 | 38 | 2018 |
An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the internet of things I Ullah, A Alomari, N Ul Amin, MA Khan, H Khattak Electronics 8 (10), 1171, 2019 | 37 | 2019 |
A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications I Ullah, N Ul Amin, M Zareei, A Zeb, H Khattak, A Khan, S Goudarzi Symmetry 11 (11), 1386, 2019 | 36 | 2019 |
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content‐Centric Network (CCN) Z Ullah, A Zeb, I Ullah, KM Awan, Y Saeed, MI Uddin, MA Al-Khasawneh, ... Mobile Information Systems 2020 (1), 4138516, 2020 | 35 | 2020 |
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN) I Ullah, S Zeadally, NU Amin, MA Khan, H Khattak Microprocessors and Microsystems 81, 103477, 2021 | 33 | 2021 |
A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach I Ullah, NU Amin, J Khan, M Rehan, M Naeem, H Khattak, SJ Khattak, ... Mathematics 7 (8), 686, 2019 | 31 | 2019 |